Welcome to the open source Intelligence fundamentals Course by Sai Buri. Many Miss Tina Shock and I will be your horse for this fun and hopefully interesting course. But before we continue, please allow me to tell a little bit about myself. Is I always say, in any of my security trainings?
I think it's my obligation to to let you know who I am and and my at least credible to talk about this topic
because you will probably do a little bit of all sins on me.
As I've mentioned, my name is Dana Shortage.
I am a cybersecurity professional from Croatia Europe.
I have over 10 years of fighting experience, professionally speaking, and by that I mean that I make a living out off working in the I T sector for over 10 years now.
I went to law school but decided to involve professionally into with I T. And one of the reasons was that I was into computers since I was a kid. When I say I'm in, I t I always point out that I'm not a programmer or developer, Rather a systems engineer.
I grew up professionally with stitches, cabling, fireball server system rooms, data centers.
I worked and still work on various certifications like Cisco, Microsoft, my critic and finished. Lots of trainings and seminars in regard to cybersecurity also went for various NLP in their linguistic programming trainings and the psychotherapy stuff which helped me in my social engineering studies
and open source intelligence was always involved
even before when I didn't have a name for it. I used various techniques and methods to get information so I could make an informed decision about something
besides career stuff. I enjoyed reading, running, singing and guitar playing. But one of things that I especially like doing is legal email fish tests for my customers. So which involves, Ah, love, a lot of social engineering.
The picture in the slide is related to fishing, not real catching off the fish. I also do live physical social engineer tests like pretending to be a new new employees in a company. But I won't bother you with that now. Now that we have met, we can start the course and the first thing I would like to point out are prerequisites,
which in my opinion, would be beneficial for you to have to understand everything so you could go easier in your further studies concerning the open source intelligence.
If you read the newspapers or you served Internet, then you already have all the prerequisites for this course. But I have divided this into two sections for which I mean are the most relevant for this course, what to know and what tohave.
So let's proceed with the what to know part.
It would be highly recommended and appreciate it, too. Did you are familiar with the basic i t terminology and concepts
that also includes cybersecurity since, oh, since he is very much involved in the cybersecurity framework.
In my personal example, I come from the technical side of Fight E, and I'm very much interested in the technical side of false, and it is easier to understand the concept concepts when you know the basics, how things work, literally basic things like, How does the Internet work and why does it look
the way it looks? And so what
next would be Lennox and Lennox like operating systems, Since many tools which we will mention and show our developed toe work on that kind of operating systems, there are great resources on cyber very for you to check out. Then there is
python. And yes, I have mentioned that I'm not a programmer, but knowing basics off any programming language can only be a plus.
And since we are involved in cybersecurity, Python is the right language.
My thing is very popular in the cybersecurity community and because of its human friendly syntax and ease a fuse. It is a great and powerful language, and most of the old since tools are written in that programming language.
Also, please check out the basic Python course on Cyber Eri. The question. What to have
from the heart of perspective. You need a computer and a smartphone and, of course, on active Internet connection, which allows you to acquire all these beautiful information and data. And lastly, your curiosity and imagination. Because your investigations are limited only by remind
and the Since there are numerous ways to learn about your target,
you will use your imagination to get to them.
When I mentioned territory ins, I have to say that for this course that is quite wide.
Actually, the topic off open source intelligence is a big one, but I hadn't narrowly down and I would lift the potential audience as following
I T. And cybersecurity professionals would be my first pick because I'm an I t. Guy.
Then I would mention law enforcement and military personnel A big part off their work is based on intelligence that they gather and make important decisions based on that information.
Then there would be companies and their employees. Besides security teams, I would like to mention human resource is and you will see later in the course. So why did I put an emphasis on them
then? They're journalists, private investigators, parents and teachers. Actually here I would like to put an emphasis on parents and teachers because I really encourage them to use this kind of knowledge to protect our youngest.
In many households, Children know more about the Internet and its usage than the adults, and that poses a problem. They're in a position to potentially Haider activity and content online. Lastly,
I'm aware that these techniques and tools can be used by anyone whose intense or malicious and in a way, evil.
But that is the risk, like with any knowledge out there. So please don't be malicious. If you were wondering why you should even take this course. I will try to tell you now
there are a handful of reasons why you should want to learn about open source intelligence, especially if you're in the cybersecurity profession and the community.
Some of the reasons I'll find here our knowledge.
If you like to learn new and exciting things, then there you're already in bold with cybersecurity, then you're on the right track. This is an opportunity to expand your expertise and advance your career with the usage of ocean knowledge
and the No house. Believe me, the amount off knowledge that you're going to come across could easily overwhelm you because there are many different technologies involved in the open source intelligence process. Next would be defense and protection.
Learn to protect yourself in your organization because all the information and data that you confined via the ocean tools and techniques, the bad guys can also find them and use them. And third fun.
I have to tell you the truth. Olson is a real fun ride, but at the same time it is quite scary. People, right Share records sent enormous amounts of data, and most of the times without even knowing that they're doing it. And all of the data is publicly available.
Also, One of the reason is the lack of awareness and the feeling of false security.
Here is where you come to play and have a chance to enhance the oval cybersecurity posture off a person or an organization and have fun along the way.
Now we're going to do a little course or of you
at their dis introduction module number one in which, which we are still in. We're going to move on to model module number two called Theory,
and I'm very sorry about that, but we have to start with the definitions part, all jokes aside and model to first. We will try to put a label on open source intelligence, actually define it. It's types, its usage and the ethics behind it.
Then we will move on to the module number three, which I called the O Sint Playground, and here we will start to prepare our environment for secure and efficient close and investigations.
The next module, number four tools and techniques, is probably one of the modules you are most interested in, and I agree it is interesting But we need a good preparation to be successful and efficient with these tools
because there are a lot of them out there and we will go through ones which I think are most relevant for doing a basic Oh, since investigation.
Then in module number five, I will talk about sock puppets, which is one of my favorite terms innocent. And I won't spoil the fund by telling you what it is now. After that, will brush on the O sent defense in the module. Six. Actually, when I say awesome defense, I mean on operational security, or OPSEC,
in which we will go over how to protect yourself or your organization.
Plus, to show you a little and Brady, it's simple examples. Help people actually share their information all over, probably without any awareness that they're actually doing it. And in the last module number seven, we will conclude our ocean fundamentals course journey with a few recommendations. Where to go next.
Throughout the course, I will show you how to use some of the tools and techniques that we're going to discuss. Also, don't forget to check out the resource is section of this course for additional information
in this introduction. Module number one. You got to know me, your host for the this course. Then we talked about the prerequisites target audience. We try to answer the question. Why should even take this course? And in the end, we did a quick or review of the topics that we're going to discuss.
Now let's move on to our second module called theory. So see you in the next video.